Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Research on Cross-domain Representation Learning Based on Multi-network Space Fusion

    Ye Yang1, Dongjie Zhu2,*, Xiaofang Li3, Haiwen Du4, Yundong Sun4, Zhixin Huo2, Mingrui Wu2, Ning Cao1, Russell Higgs5

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1379-1391, 2022, DOI:10.32604/iasc.2022.025181

    Abstract In recent years, graph representation learning has played a huge role in the fields and research of node clustering, node classification, link prediction, etc., among which many excellent models and methods have emerged. These methods can achieve better results for model training and verification of data in a single space domain. However, in real scenarios, the solution of cross-domain problems of multiple information networks is very practical and important, and the existing methods cannot be applied to cross-domain scenarios, so we research on cross-domain representation is based on multi-network space integration. This paper conducts representation learning research for cross-domain scenarios.… More >

  • Open Access

    ARTICLE

    Stream Cipher Based on Game Theory and DNA Coding

    Khaled Suwais*

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1815-1834, 2022, DOI:10.32604/iasc.2022.025076

    Abstract Securing communication over public communication channels is one of the challenging issues in the field of cryptography and information security. A stream cipher is presented as an approach for securing exchanged data between different parties through encryption. The core of stream cipher relies on its keystream generator, that is responsible for generating random and secure keystream of encrypting streaming data. Thus, the security of the keystream is measured by its randomness and its resistance to statistical and cryptanalytic attacks. As there is always a trade-off between the security and performance while designing new cryptographic primitives, we introduce a game theory-based… More >

  • Open Access

    ARTICLE

    Computational Approximations for Real-World Application of Epidemic Model

    Shami A. M. Alsallami1, Ali Raza2,*, Mona Elmahi3, Muhammad Rafiq4, Shamas Bilal5, Nauman Ahmed6, Emad E. Mahmoud7

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1923-1939, 2022, DOI:10.32604/iasc.2022.024993

    Abstract The real-world applications and analysis have a significant role in the scientific literature. For instance, mathematical modeling, computer graphics, camera, operating system, Java, disk encryption, web, streaming, and many more are the applications of real-world problems. In this case, we consider disease modeling and its computational treatment. Computational approximations have a significant role in different sciences such as behavioral, social, physical, and biological sciences. But the well-known techniques that are widely used in the literature have many problems. These methods are not consistent with the physical nature and even violate the actual behavior of the continuous model. The structural properties… More >

  • Open Access

    ARTICLE

    Image Masking and Enhancement System for Melanoma Early Stage Detection

    Fikret Yalcinkaya*, Ali Erbas

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1961-1977, 2022, DOI:10.32604/iasc.2022.024961

    Abstract Early stage melanoma detection (ESMD) is crucial as late detection kills. Computer aided diagnosis systems (CADS) integrated with high level algorithms are major tools capable of ESMD with high degree of accuracy, specificity, and sensitivity. CADS use the image and the information within the pixels of the image. Pixels’ characteristics and orientations determine the colour and shapes of the images as the pixels and associated environment are closely interrelated with the lesion. CADS integrated with Convolutional Neural Networks (CNN) specifically play a major role for ESMD with high degree of accuracy. The proposed system has two steps to produce high… More >

  • Open Access

    ARTICLE

    A New Color Model for Fire Pixels Detection in PJF Color Space

    Amal Ben Hamida1,*, Chokri Ben Amar2, Yasser Albagory2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1607-1621, 2022, DOI:10.32604/iasc.2022.024939

    Abstract Since the number of fires in the world is rising rapidly, automatic fire detection is getting more and more interest in computer vision community. Instead of the usual inefficient sensors, captured videos by video surveillance cameras can be analyzed to quickly detect fires and prevent damages. This paper presents an early fire-alarm raising method based on image processing. The developed work is able to discriminate fire and non-fire pixels. Fire pixels are identified thanks to a rule-based color model built in the PJF color space. PJF is a newly designed color space that enables to better reflect the structure of… More >

  • Open Access

    ARTICLE

    Blockchain Enabled Optimal Lightweight Cryptography Based Image Encryption Technique for IIoT

    R. Bhaskaran1, R. Karuppathal1, M. Karthick2, J. Vijayalakshmi3, Seifedine Kadry4, Yunyoung Nam5,*

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1593-1606, 2022, DOI:10.32604/iasc.2022.024902

    Abstract Industrial Internet of Things (IIoT) and Industry 4.0/5.0 offer several interconnections between machinery, equipment, processes, and personnel in diverse application areas namely logistics, supply chain, manufacturing, transportation, and healthcare. The conventional security-based solutions in IIoT environment get degraded due to the third parties. Therefore, the recent blockchain technology (BCT) can be employed to resolve trust issues and eliminate the need for third parties. Therefore, this paper presents a novel blockchain enabled secure optimal lightweight cryptography based image encryption (BC-LWCIE) technique for industry 4.0 environment. In addition, the BC-LWCIE technique involves the design of an optimal LWC based hash function with… More >

  • Open Access

    ARTICLE

    Ant-based Energy Efficient Routing Algorithm for Mobile Ad hoc Networks

    P. E. Irin Dorathy1,*, M. Chandrasekaran2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1423-1438, 2022, DOI:10.32604/iasc.2022.024815

    Abstract In this paper, an Ant Colony Optimization (ACO) based Energy Efficient Shortest Path Routing (AESR) algorithm is developed for Mobile Ad hoc Network (MANET). The Mobile Ad hoc Network consists of a group of mobile nodes that can communicate with each other without any predefined infrastructure. The routing process is critical for this type of network due to its dynamic topology, limited resources and wireless channel. The technique incorporated in this paper for optimizing the routing in a Mobile ad hoc network is Ant Colony Optimization. The ACO algorithm is used to solve network problems related to routing, security, etc.… More >

  • Open Access

    ARTICLE

    Classification of Liver Tumors from Computed Tomography Using NRSVM

    S. Priyadarsini1,*, Carlos Andrés Tavera Romero2, M. Mrunalini3, Ganga Rama Koteswara Rao4, Sudhakar Sengan5

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1517-1530, 2022, DOI:10.32604/iasc.2022.024786

    Abstract A classification system is used for Benign Tumors (BT) and Malignant Tumors (MT) in the abdominal liver. Computed Tomography (CT) images based on enhanced RGS is proposed. Diagnosis of liver diseases based on observation using liver CT images is essential for surgery and treatment planning. Identifying the progression of cancerous regions and Classification into Benign Tumors and Malignant Tumors are essential for treating liver diseases. The manual process is time-consuming and leads to intra and inter-observer variability. Hence, an automatic method based on enhanced region growing is proposed for the Classification of Liver Tumors (LT). To enhance the Liver Region… More >

  • Open Access

    ARTICLE

    Electricity Theft Detection and Localization in Smart Grids for Industry 4.0

    Worakamol Wisetsri1, Shamimul Qamar2, Gaurav Verma3,*, Deval Verma4, Varun Kumar Kakar5, Thanyanant Chansongpol6, Chanyanan Somtawinpongsai6, Chai Ching Tan7

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1473-1483, 2022, DOI:10.32604/iasc.2022.024610

    Abstract Industry 4.0 is considered as the fourth revolution in industrial sector that represents the digitization of production process in a smarter way. Industry 4.0 refers to the intelligent networking of machines, their processes, and infrastructure, as well as the use of information and computer technology to transform industry. The technologies like industrial internet of things (IIoT), big data analytics, cloud computing, augmented reality and cyber security are the main pillars of industry 4.0. Industry 4.0, in particular, is strongly reliant on the IIoT that refers to the application of internet of things (IoT) in industrial sector like smart grids (SG).… More >

  • Open Access

    ARTICLE

    Preserving Data Confidentiality in Association Rule Mining Using Data Share Allocator Algorithm

    D. Dhinakaran1,*, P. M. Joe Prathap2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1877-1892, 2022, DOI:10.32604/iasc.2022.024509

    Abstract These days, investigations of information are becoming essential for various associations all over the globe. By and large, different associations need to perform information examinations on their joined data sets. Privacy and security have become a relentless concern wherein business experts do not desire to contribute their classified transaction data. Therefore, there is a requirement to build a proficient methodology that can process the broad mixture of data and convert those data into meaningful knowledge to the user without forfeiting the security and privacy of individuals’ crude information. We devised two unique protocols for frequent mining itemsets in horizontally partitioned… More >

Displaying 8751-8760 on page 876 of 22233. Per Page